Sciweavers

1801 search results - page 49 / 361
» Memory-Centric Security Architecture
Sort
View
FTDCS
1997
IEEE
15 years 6 months ago
Distributed Transaction Processing as a Reliability Concept for Mobile Agents
Mobile agents offer a new possibility for the development of applications in distributed systems and are no longer a theoretical issue since different architectures for their impl...
Hartmut Vogler, Thomas Kunkelmann, Marie-Luise Mos...
DAC
2009
ACM
14 years 11 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
ICSE
1993
IEEE-ACM
15 years 6 months ago
Formal Approaches to Software Architecture
Over the past 15 years there has been increasing recognition that careful attention to the design of a system’s software architecture is critical to satisfying its requirements ...
David Garlan
AISS
2010
165views more  AISS 2010»
14 years 11 months ago
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application
A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. ...
M. R. Aliabadi, Mohammad Reza Ahmadi
121
Voted
IWAN
1999
Springer
15 years 6 months ago
ANMAC: An Architectural Framework for Network Management and Control using Active Networks
In this paper, we propose a new framework called Active Network Management and Control (ANMAC) for the management and control of high speed networks. The software architecture in A...
Samphel Norden, Kenneth F. Wong